Re: [Idr] Fwd:I-D ACTION:draft-pmohapat-idr-acceptown-community-01.txt

Robert Raszuk <raszuk@juniper.net> Wed, 30 April 2008 23:34 UTC

Return-Path: <idr-bounces@ietf.org>
X-Original-To: idr-archive@megatron.ietf.org
Delivered-To: ietfarch-idr-archive@core3.amsl.com
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 982473A6A2A; Wed, 30 Apr 2008 16:34:45 -0700 (PDT)
X-Original-To: idr@core3.amsl.com
Delivered-To: idr@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 92B9C3A6A2A for <idr@core3.amsl.com>; Wed, 30 Apr 2008 16:34:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bPye1RHH4rrn for <idr@core3.amsl.com>; Wed, 30 Apr 2008 16:34:43 -0700 (PDT)
Received: from exprod7og101.obsmtp.com (exprod7og101.obsmtp.com [64.18.2.155]) by core3.amsl.com (Postfix) with ESMTP id F016A3A677D for <idr@ietf.org>; Wed, 30 Apr 2008 16:34:42 -0700 (PDT)
Received: from source ([66.129.224.36]) by exprod7ob101.postini.com ([64.18.6.12]) with SMTP; Wed, 30 Apr 2008 16:34:45 PDT
Received: from magenta.juniper.net ([172.17.27.123]) by emailsmtp55.jnpr.net with Microsoft SMTPSVC(6.0.3790.1830); Wed, 30 Apr 2008 16:30:36 -0700
Received: from [172.26.250.99] ([172.26.250.99]) by magenta.juniper.net (8.11.3/8.11.3) with ESMTP id m3UNUZx19769; Wed, 30 Apr 2008 16:30:35 -0700 (PDT) (envelope-from raszuk@juniper.net)
Message-ID: <48190119.60705@juniper.net>
Date: Wed, 30 Apr 2008 16:30:33 -0700
From: Robert Raszuk <raszuk@juniper.net>
User-Agent: Thunderbird 2.0.0.14 (Windows/20080421)
MIME-Version: 1.0
To: Danny McPherson <danny@tcb.net>
References: <20080425213001.4EB133A69E7@core3.amsl.com> <64E4CA6A-B8E4-4390-BDA6-39EF28E95AEA@tcb.net> <7000E71D8C525042A815432358B2F1240138D45E@paul.adoffice.local.de.easynet.net> <DE879141-E245-4051-A04D-9FF5CF97F892@bgp.nu> <39074353-26E5-4239-A193-E4DD84AE75A0@tcb.net> <014A2382-C5CE-4657-B4DA-FC84D7772359@bgp.nu><4686A93B-EF16-48DC-9775-1BD241575360@tcb.net><4818D897.3070804@cisco.com><DC5EBA07-BBE5-4D6D-9F3E-C40C66ACE34B@tcb.net><4818DB47.8040002@cisco.com><82B7CFF7-86CB-4DC7-BE53-29004128B5CB@tcb.net><4818DCFC.70001@cisco.com> <8D3C8A4B-B80B-4983-8DC7-A142FFA4B41C@tcb.net> <4818ECF1.1030909@juniper.net> <157A9EDC-B512-4C05-A257-72D70DFB44FA@tcb.net>
In-Reply-To: <157A9EDC-B512-4C05-A257-72D70DFB44FA@tcb.net>
X-OriginalArrivalTime: 30 Apr 2008 23:30:36.0953 (UTC) FILETIME=[3196E090:01C8AB1A]
Cc: idr idr <idr@ietf.org>
Subject: Re: [Idr] Fwd:I-D ACTION:draft-pmohapat-idr-acceptown-community-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: raszuk@juniper.net
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/idr>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: idr-bounces@ietf.org
Errors-To: idr-bounces@ietf.org

Hi Danny,

>  > It is very cheap and easy to drop the unneeded route on inbound 
>  > while it is very CPU intensive to build separate updates to each peer.
> 
> Really?  Where's the line drawn?  What about when there are
> one million updates being dropped?  I could probably make a
> case for this today?  What about legit updates queued behind
> these?

Let me address your concerns one by one ...

* The line is drawn when you have 100s of PEs to send the same 
information to.

* The milion updates to be dropped .... Clearly you must be talking 
about VPN routes. If so there are hardly single PE with milion routes to 
  make such a case today. Total number of routes yes but this draft is 
orthogonal to this. You are complaining about the 2796 case again here.

* Each PE can today receive only legit updates with or without of this 
draft including RRs support for 2796. There are well know standard based 
technics for this example: rfc4684.

Can you tell us how your argument holds when you support rfc4684 ?

>  > With current link bandwith the amount of traffic generated due to that
>  > is just white noise.
> 
> Traffic wasn't the issue.  It's more CPU, memory, etc..  Just
> because it's available doesn't mean it's free.

Memory is just a transient memory. If your CPU suffers with inbound 
filtering I think there are much bigger issues behind the scenes.

Keep in mind that discussed here draft does not increase number of 
routes each PE would receive even by a single one. All of your points 
Danny flame the issue of reflecting back the information to the client 
which were originated by it before. Perhaps this is a valid theoretical 
complain but it is just out of this topic. And as said before this is 
all for VPN space where this problem has already been addressed by rfc4684.

>  > There are practical applications for this enhancement of which one is
>  > described in the draft.
> 
> Yes, one that introduces even local PE VRF-VRF connectivity
> reliance on upstream RRs..

You are missing the big picture :) This is to provide functional 
consistency ... RR will propagate the same very update to all PE - which 
very often are in hundreds or maybe thousands of today's large 
providers. Only one of them originated the route .. appending this new 
community will not have any impact in all of the PEs .. only in the 
originator which will accept the route and perform required action which 
will be consistent with all other PEs in the network.

>  > As general rule of thumb I think there is need to support more
>  > automation in the network provisioning among many providers. There is
>  > also a demand in the market for more dynamic behavior of running
>  > applications. This is just right on this spot attempt to support one 
>  > of
>  > them.
> 
> Perhaps, but I think it ugly because of both clean routing hygiene
> issues, and the network architectural fault considerations I've already
> outlined.

Recently we have had hussars bashing "BGP overload" ... now in 2008 
perhaps we see a new trend "routing hygiene". So can you spell what is 
so unhygienic in this draft ? All points you have brought so far talk 
about solved issue (in the VPN space) if reflecting unneeded routes to 
PEs ... but non of your points refer to this draft. Can you put in 
points how this draft make this any worse ?

Cheers,
R.

_______________________________________________
Idr mailing list
Idr@ietf.org
https://www.ietf.org/mailman/listinfo/idr